Akamai Diversity
Home > Web Security

Recently in Web Security Category

How Can You Trust a Website?


During an early summer morning on August 1982, in the brightly lit hallway of a non-descript academic building on the campus of University of California Berkeley, two scientists who were working on what the world will later know as the Internet, had a brief but very important conversation:

"How can we trust ARPANET?"

"Because you can trust your colleagues."

Media Coverage of the Q2 2015 SOTI Security Report

It's only been a couple days since we released the Q2 2015 State of the Internet Security Report, but it has already generated a fair amount of media coverage. The following articles are what we've seen so far.

Attackers are using insecure routers and other home devices for DDoS attacks (Computerworld)

A report released Tuesday by cloud services provider Akamai Technologies shows that the number of DDoS attacks is on the rise. During the second quarter of 2015 it increased by 7 percent compared to the previous three months and by 132 percent compared to the same period last year, the company's data revealed.


Search Engine Optimization (SEO) campaigns are prevalent and legitimate ways to promote web applications in order to get a better visibility and more traffic to your web application. But what happens when an SEO campaign crosses the line into the dark side and becomes malicious?

Recently the Akamai Threat Research Team discovered a highly sophisticated SEO attack campaign that was promoting the search results rating for a web application that allows users to share their cheating and infidelity stories.

Do the WAF Revolution

Akamai famously lost the first competition it entered, the MIT 50k, before securing funding and becoming a wildly successful start up and one of the largest IPOs in history.  Today Akamai is a 2B public company that prides itself on fighting the odds in order to challenge the status quo and provide business value to customers.


Akamai's 8th Annual Customer Conference is approaching quickly and we have some great industry speakers joining us to share how they are overcoming some of the toughest challenges in Commerce. 

Speakers from Norwegian Cruise Lines, Crocs, Mary Kay and Guitar Center, among many others will share ideas, best practices and tactics to improve customer experience and increase key performance metrics as we address key trends shaping the industry.

Q2 2015 State of the Internet Security Report Released

Akamai has released the Q2 2015 State of the Internet Security Report. This quarter's report, which provides analysis and insight into the global cloud security threat landscape, can be downloaded here.

Previews for the Q2 State of the Internet Security Report:


Q2 SOTI Security Preview: The Shellshock Effect

This is the final preview for the Q2 2015 State of the Internet Security Report, which comes out tomorrow. Here, we take a look at web application attacks and the impact that comes with adding two attack types to the picture. Note: We'll show the actual percentages for these attacks once the report is officially released. One more day!

Previews for the Q2 State of the Internet Security Report:


Q2 SOTI Security Preview: Tor Pros and Cons

The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections. 

Tuesday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Yesterday we looked at attack vectors the bad guys favored in Q2. Today we look at the security risks businesses face when using Tor.

The Q2 2015 State of the Internet Security Report (SOTI Security) is due out in the next couple of weeks, and today we continue previewing various sections.

Yesterday we told you about security risks that come into play when third-party plug-ins are used with Wordpress. Today we look at attack vectors the bad guys favored in Q2.

The Q2 2015 State of the Internet - Security Report (SOTI Security) is due out in the next couple of weeks, and today we begin previewing various sections. Let's begin with the potential security risks that come into play when third-party plug-ins are used with Wordpress.

WordPress is the world's most popular website and blogging platform. Its ever-growing popularity makes it an attractive target for attackers who aim to exploit hundreds of known vulnerabilities to build botnets, spread malware and launch DDoS campaigns.